The Semgrep MCP Server is a beta implementation that integrates Semgrep, a powerful static analysis tool, with the Model Context Protocol (MCP). This server allows you to scan code for security vulnerabilities directly within LLMs, AI agents, and coding tools like Cursor. It provides a comprehensive interface to Semgrep, enabling code scanning, rule customization, and result analysis.
uv
using their installation instructions.shell
pip install semgrep
docker build -t mcp-server .
uv run mcp run server.py -t sse
docker run -p 8000:8000 mcp-server
Or use the pre-built image:
docker run -p 8000:8000 ghcr.io/semgrep/mcp:latest
from mcp.client import Client
client = Client()
client.connect("localhost:8000")
# Scan code for security issues
results = client.call_tool("semgrep_scan", {
"code": "def get_user(user_id):\n return User.objects.get(id=user_id)",
"language": "python"
})
MCP
tab.Semgrep
, Type: sse
, Server URL: http://127.0.0.1:8000/sse
.# Scan an entire directory
results = client.call_tool("scan_directory", {
"path": "/path/to/code",
"config": "p/security-audit"
})
# Filter results by severity
filtered = client.call_tool("filter_results", {
"results_file": "/path/to/results.json",
"severity": "ERROR"
})
uv run mcp dev server.py
By default, the server runs on http://localhost:3000
with the inspector server on http://localhost:5173
.
Note: When opening the inspector server, add query parameters to the URL to increase the default timeout:
http://localhost:5173/?timeout=300000
The Semgrep MCP Server is a beta project that integrates Semgrep with the MCP framework, enabling code scanning within LLMs and AI agents. It is licensed under the MIT license and actively developed by the Semgrep community.